Bug 1790318 (CVE-2019-15695) - CVE-2019-15695 tigervnc: Stack buffer overflow in CMsgReader::readSetCursor
Summary: CVE-2019-15695 tigervnc: Stack buffer overflow in CMsgReader::readSetCursor
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2019-15695
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1791772 1791773 1791774 1819877 1819878
Blocks: 1790319
TreeView+ depends on / blocked
 
Reported: 2020-01-13 06:17 UTC by Pedro Sampaio
Modified: 2020-09-29 19:28 UTC (History)
4 users (show)

Fixed In Version: tigervnc 1.10.1
Clone Of:
Environment:
Last Closed: 2020-04-16 22:32:01 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2020:1497 0 None None None 2020-04-16 21:06:37 UTC
Red Hat Product Errata RHSA-2020:3875 0 None None None 2020-09-29 19:27:59 UTC

Description Pedro Sampaio 2020-01-13 06:17:09 UTC
TigerVNC version prior to 1.10.1 is vulnerable to stack buffer overflow, which could be triggered from CMsgReader::readSetCursor. This vulnerability occurs due to insufficient sanitization of PixelFormat. Since remote attacker can choose offset from start of the buffer to start writing his values, exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.

Upstream patch:

https://github.com/CendioOssman/tigervnc/commit/05e28490873a861379c943bf616614b78b558b89

References:

https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1
https://www.openwall.com/lists/oss-security/2019/12/20/2

Comment 1 errata-xmlrpc 2020-04-16 21:06:36 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2020:1497 https://access.redhat.com/errata/RHSA-2020:1497

Comment 2 Product Security DevOps Team 2020-04-16 22:32:01 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2019-15695

Comment 3 errata-xmlrpc 2020-09-29 19:27:57 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2020:3875 https://access.redhat.com/errata/RHSA-2020:3875


Note You need to log in before you can comment on or make changes to this bug.